WinRAR vulnerable to remote code execution, patch now! (CVE-2023-40477)
RARLAB has fixed a high-severity RCE vulnerability (CVE-2023-40477) in the popular file archiver tool WinRAR. About CVE-2023-40477 A widely used Windows-only utility, WinRAR can create and extract file archives in various compression formats (RAR, ZI.....»»
Satellite imagery now identifies plastic on remote beaches
Australian researchers have developed a new method for spotting plastic rubbish on our beaches and successfully field tested it on a remote stretch of coastline......»»
Tattoos to confront the terror of death: Researchers examine rise of memorial tattoos in Israel
The October 7, 2023 Hamas attacks on Israel resulted in widespread trauma, impacting not only the direct victims but also the broader population. Many experienced posttraumatic symptoms. This collective trauma blurred the lines between witnesses and.....»»
Ransomware hits web hosting servers via vulnerable CyberPanel instances
A threat actor – or possibly several – has hit approximately 22,000 vulnerable instances of CyberPanel and encrypted files on the servers running it with the PSAUX and other ransomware. The PSAUX ransom note (Source: LeakIX) The CyberPane.....»»
Google CEO says over 25% of new Google code is generated by AI
We've always used tools to build new tools, and developers using AI continue that tradition. On Tuesday, Google's CEO revealed that AI systems now generate more than a quarter of.....»»
iPhone 16 struggles to catch on while Pro models hold strong
Apple's iPhone 16 launch is off to a slow start, with early sales suggesting that buyers might be more interested in 2023's models than the latest upgrades.iPhone 15 and iPhone 16According to early data, the iPhone 16 models, released in September 20.....»»
Compact in-incubator imaging device allows real-time remote monitoring of cell growth
Unlike most cells in the human body, stem cells have the unique ability to divide indefinitely. This property makes them especially appealing to scientists exploring ways to extend human lifespans or develop new methods for repairing damaged tissues......»»
Russian hackers deliver malicious RDP configuration files to thousands
Midnight Blizzard – a cyber espionage group that has been linked to the Russian Foreign Intelligence Service (SVR) – is targeting government, academia, defense, and NGO workers with phishing emails containing a signed Remote Desktop Proto.....»»
Report reveals a "vital sanctuary" for wildlife and endangered species in Cambodia"s Central Cardamom Mountains
The first-ever camera trap study of the Central Cardamom Mountains Landscape has recorded 108 species, 23 of which are listed at risk (Vulnerable or above) on the IUCN Red List, underscoring the significance of the region as a global stronghold for b.....»»
6 key elements for building a healthcare cybersecurity response plan
Medical practices remain vulnerable to cyberattacks, with over a third unable to cite a cybersecurity incident response plan, according to Software Advice. This gap exposes healthcare providers to risks of patient data breaches, HIPAA violations, fin.....»»
Brics+ could shape a new world order, but it lacks shared values and a unified identity
The last two summits of Brics countries have raised questions about the coalition's identity and purpose. This began to come into focus at the summit hosted by South Africa in 2023, and more acutely at the recent 2024 summit in Kazan, Russia......»»
The faces of disaster: Social vulnerability spotlighted in dataset
Natural hazards like hurricanes can take a higher than average toll on life and property on certain population groups, such as the elderly. A dataset that highlights vulnerable populations in hazard mitigation plans was awarded a 2024 DesignSafe Data.....»»
Black Basta operators phish employees via Microsoft Teams
Black Basta ransomware affiliates are still trying to trick enterprise employees into installing remote access tool by posing as help desk workers, now also via Microsoft Teams. Phishing via MS Teams Earlier this year, Rapid7 warned about Black Basta.....»»
iPhone 16 demand remains in line with the iPhone 15
Investment bank JP Morgan says that demand for the iPhone 16 range is roughly the same as for the iPhone 15 in 2023, but shipping times for the Pro models are shrinking.iPhone 16 [left], iPhone 16 ProWith Apple not releasing details of how many iPhon.....»»
When will Apple stop supporting Intel Macs?
Apple transitioned the Mac lineup to Apple Silicon starting in 2020, and they completed the transition in 2023. Since the transition started, Apple quickly started dropping support for Intel Macs on newer versions of macOS. That raises the question:.....»»
Mary, Queen of Scots and the clandestine tricks of the women who kept her secrets
Mary, Queen of Scots spent almost 20 years in captivity. She was held in various locations across Britain from 1568 until her execution on February 8, 1587. As I explain in my new book, Captive Queen: The Decrypted History of Mary, Queen of Scots, du.....»»
Cracking the code: Researchers unlock a "new synthetic frontier" for quantum dots
The type of semiconductive nanocrystals known as quantum dots are both expanding the forefront of pure science and also hard at work in practical applications including lasers, quantum QLED televisions and displays, solar cells, medical devices, and.....»»
How to open the Liberty Falls vault in Call of Duty: Black Ops 6
The Liberty Falls zombies map has a tantalizing bank vault waiting to be cracked in Black Ops 6. The code is hard to find, but we can help you get inside it......»»
Hyper Shop Spooky Sale: Get 31% off cables, chargers, USB-C hubs and more
Hyper Shop's Spooky Sale is offering discounts of up to 31% off on various accessories for computers and mobile devices, through a code you enter upon checkout......»»
Researchers warn against weakening Clean Air Act regulations
A new commentary published in the American Journal of Public Health has found that power plants' use of air pollution control devices saved up to 9,100 lives and up to $100 billion in health costs in 2023. These estimates reveal the substantial healt.....»»
Exploited: Cisco, SharePoint, Chrome vulnerabilities
Threat actors have been leveraging zero and n-day vulnerabilities in Cisco security appliances (CVE-2024-20481), Microsoft Sharepoint (CVE-2024-38094), and Google’s Chrome browser (CVE-2024-4947). CVE-2024-20481 (Cisco ASA/FTD) In the past few.....»»